Sunday, June 1, 2025
HomeCyber Security NewsIndian National Arrested for Stealing $150,000 via Computer Hacking

Indian National Arrested for Stealing $150,000 via Computer Hacking

Published on

SIEM as a Service

Follow Us on Google News

A cybercriminal from India was taken into custody for utilizing computer hacking to steal a sum of $150,000 from an elderly woman.

A computer hacker is an individual with exceptional proficiency in computer technology, who is highly skilled in discovering and exploiting vulnerabilities in software and computer systems.

They possess a deep understanding of programming languages, network protocols, and system architectures, and use their knowledge to uncover weaknesses in security measures.

- Advertisement - Google News

Fraud Incident

Jane Doe fell victim to a fraud incident due to a pop-up notification that appeared on her computer screen. The pop-up claimed that her system had been hacked and instructed her to contact customer service at a provided phone number.

Following Jane Doe’s acceptance, she was directed by a group of fraudsters to withdraw money from her bank accounts and store it at the “Fed.” Jane Doe complied and transferred a sum of $150,000 to the fraudsters in cash.

The FBI devised a trap by having Jane Doe inform the criminals that she possessed $50,000 in cash, which led to their apprehension.

So, Sukhdev Vaid and co-defendant Eddly Joseph came to Montana to steal money from Jane, and the Department arrested both criminals by installing Ultraviewer on Jane’s computer.

According to court documents, the government alleged that a sizable Indian enterprise was complicit in stealing funds from senior citizens in the United States. 

Even though Vaid was found guilty of hacking, he could face serious consequences including up to 20 years in prison, a fine of $250,000, and three years of supervised release.

The U.S. Sentencing Guidelines and other legally required criteria will be considered by the court when determining the sentence. Sentencing is scheduled for February 14, 2024, and Vaid is currently detained in custody after being arrested.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...